{"id":732,"date":"2006-02-15T00:00:00","date_gmt":"2006-02-15T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/02\/15\/good-security-news-in-short-supply\/"},"modified":"2021-12-30T11:38:04","modified_gmt":"2021-12-30T11:38:04","slug":"good-security-news-in-short-supply","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/02\/15\/good-security-news-in-short-supply\/","title":{"rendered":"Good security news in short supply"},"content":{"rendered":"<p>With the start of the new year, it&#8217;s time to take a shot at predicting the key trends that will define the field of information security in 2006.   Predications include: New attack vectors will grow precipitously, Rootkits become familiar to the masses, Secure development processes become mandatory, Security management moves to network operations, Key management becomes a major new requirement, More security outsourcing, More security Outsourcing.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><b>New attack vectors will grow precipitously<\/b><br \/>\nLook for a big increase in the number of attacks via instant-messaging clients, Internet Protocol telephony, cell phones, Bluetooth and XML.<br \/>\n<b>Rootkits become familiar to the masses<\/b><br \/>\nRootkits become familiar to the masses A rootkit is an extremely clandestine type of malware that hides itself within operating system kernels or application binaries.<br \/>\n<b>Secure development processes become mandatory <\/b><br \/>\nUsers are simply fed up with sloppy vulnerability-ridden code and weak security support from most independent software vendors.  Look for large organisations to clamp down by placing contractual demands on software providers mandating that they implement security processes and metrics or take a hike.  Microsoft is ahead of the pack in this area, while &#8220;unbreakable&#8221; Oracle lags way behind and could lose major contracts as a result.<br \/>\n<b>Security management moves to network operations<\/b><br \/>\nAt an enterprise level, network security depends on spotting anomalous activities and capturing security events.<br \/>\n<b>Key management becomes a major new requirement<\/b><br \/>\nDatabase, networking, storage and firewall vendors either have or will add encryption to their solutions in 2006.<br \/>\n<b>More security outsourcing <\/b>It&#8217;s hard enough to administer a firewall and intrusion detection systems, to also deal with abundant security solutions for e-mail, IP telephony, Web services, wireless devices, and so on.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-732","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=732"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/732\/revisions"}],"predecessor-version":[{"id":3219,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/732\/revisions\/3219"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}